0401~0402_哆啦A夢知識大探索17:地下空間探險車
0401~0403_4月選書

英文書 > 全部商品

Computational Science and Its Applications - Iccsa 2025 Workshops

Springer 出版
2025/07/07 出版

The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were held in conjunction with the 25th International Conference on Computational Science and Its Applications, ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.

9 特價4697
立即代訂
下次再買

Computational Science and Its Applications - Iccsa 2025 Workshops

Springer 出版
2025/07/07 出版

The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were held in conjunction with the 25th International Conference on Computational Science and Its Applications, ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.

9 特價4697
立即代訂
下次再買

Computational Science and Its Applications - Iccsa 2025 Workshops

Springer 出版
2025/07/07 出版

The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were held in conjunction with the 25th International Conference on Computational Science and Its Applications, ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.

9 特價4697
立即代訂
下次再買

Privacy and Security for Large Language Models

Baihan,Lin  著
O'Reilly Media 出版
2025/07/07 出版

As the deployment of AI technologies surges, the need to safeguard privacy and security in the use of large language models (LLMs) is more crucial than ever. Professionals face the challenge of leveraging the immense power of LLMs for personalized applications while ensuring stringent data privacy and security. The stakes are high, as privacy breaches and data leaks can lead to significant reputational and financial repercussions. This book serves as a much-needed guide to addressing these pressing concerns. Dr. Baihan Lin offers a comprehensive exploration of privacy-preserving and security techniques like differential privacy, federated learning, and homomorphic encryption, applied specifically to LLMs. With its hands-on code examples, real-world case studies, and robust fine-tuning methodologies in domain-specific applications, this book is a vital resource for developing secure, ethical, and personalized AI solutions in today's privacy-conscious landscape. By reading this book, you'll: Discover privacy-preserving techniques for LLMs Learn secure fine-tuning methodologies for personalizing LLMs Understand secure deployment strategies and protection against attacks Explore ethical considerations like bias and transparency Gain insights from real-world case studies across healthcare, finance, and more

9 特價2736
立即代訂
下次再買

Computational Science and Its Applications - Iccsa 2025 Workshops

Springer 出版
2025/07/07 出版

The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were held in conjunction with the 25th International Conference on Computational Science and Its Applications, ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.

9 特價4697
立即代訂
下次再買

Computational Science and Its Applications - Iccsa 2025 Workshops

Springer 出版
2025/07/07 出版

The fourteen-volume set LNCS 15886-15899 constitutes the papers of several workshops which were held in conjunction with the 25th International Conference on Computational Science and Its Applications, ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.

9 特價4697
立即代訂
下次再買

Learning Serverless Security

O'Reilly Media 出版
2025/07/07 出版

Serverless computing now serves as a strategic backbone of modern cloud architectures, helping teams move faster and operate at scale. However, many still struggle to understand the security model of serverless computing. As more organizations migrate critical systems and sensitive data to the cloud using serverless architectures, this gap in serverless security knowledge increasingly exposes them to serious security incidents and data breaches. This practical guide covers offensive and defensive security techniques to audit and secure serverless applications running on AWS, Azure, and Google Cloud. You'll explore how to attack and defend vulnerable serverless applications using step-by-step instructions. By the end of this book, you'll understand how to prevent various serverless application attacks and privilege escalation techniques. Author Joshua Arvin Lat, chief technology officer at NuWorks Interactive Labs and an AWS AI Hero, shows you how to: Identify and address vulnerabilities within modern serverless applications Dive deeper into serverless security risks and threats Explore privilege escalation techniques in vulnerable-by-design serverless lab environments Configure authentication and identity services properly on AWS, Azure, and Google Cloud Implement security strategies and best practices to prevent serverless application attacks Audit serverless function code using security tools and strategies

9 特價2394
立即代訂
下次再買

AI vs. Humanity - The Battle for Human Relevance

Tellwell Talent 出版
2025/07/07 出版

The AI revolution is here-will you adapt or be left behind? Artificial Intelligence is reshaping industries, automating jobs, and redefining what it means to be human. As AI advances at an unprecedented pace, one question remains: Where do we fit in?In this eye-opening book, certified AI consultant and strategist Christopher Uchenwa unpacks the challenges and opportunities of our AI-driven future. Discover: - How AI is transforming jobs, businesses, and everyday life- The biggest threats and ethical dilemmas AI presents- The key skills you need to stay relevant in an AI-powered world.- How businesses can harness AI for innovation and growthThis is more than a book about technology, it's your blueprint for thriving in the age of AI.

9 特價917
立即代訂
下次再買

AI vs. Humanity - The Battle for Human Relevance

Tellwell Talent 出版
2025/07/07 出版

The AI revolution is here-will you adapt or be left behind? Artificial Intelligence is reshaping industries, automating jobs, and redefining what it means to be human. As AI advances at an unprecedented pace, one question remains: Where do we fit in?In this eye-opening book, certified AI consultant and strategist Christopher Uchenwa unpacks the challenges and opportunities of our AI-driven future. Discover: - How AI is transforming jobs, businesses, and everyday life- The biggest threats and ethical dilemmas AI presents- The key skills you need to stay relevant in an AI-powered world.- How businesses can harness AI for innovation and growthThis is more than a book about technology, it's your blueprint for thriving in the age of AI.

9 特價1238
立即代訂
下次再買

Computational Science and Its Applications - Iccsa 2025 Workshops

Springer 出版
2025/07/06 出版

The 362 full papers, 37 short papers and 2 PHD showcase included in this book were carefully reviewed and selected from 1043 submissions. In addition, the conference consisted of 58 workshops, focusing on very topical issues of importance to science, technology and society: from new mathematical approaches for solving complex computational systems, to information and knowledge in the Internet of Things, new statistical and optimization methods, several Artificial Intelligence approaches, sustainability issues, smart cities and related technologies.

9 特價4175
立即代訂
下次再買

Unleashing the Power of Blockchain and Iot for Water Informatics

Springer 出版
2025/07/04 出版
9 特價10439
貨到通知
下次再買

Innovative Computing 2025, Volume 1

Hao-Shang,Ma  著
Springer 出版
2025/07/04 出版
9 特價9395
立即代訂
下次再買

The vCISO Playbook

Yan,Ross Jd  著
2025/07/04 出版

The vCISO Playbook: How Virtual CISOs Deliver Enterprise-Grade Cybersecurity to Small and Medium Businesses (SMBs) Protect Your Data with a vCISO Working for Your Business The authors of this Guide have focused on two principal audiences: Small and Midsized Businesses (SMBs) and Virtual Chief Information Security Officers (vCISOs). vCISOs in this context may also be referred to as Subject Matter Experts (SMEs). By extension, we include in our audience trusted professional advisers to SMBs, such as attorneys, investment bankers, and financial consultants. Our combined experience in cybersecurity and small business matters spans over 50 years, and we have concentrated on the intersection of the needs of SMBs with the capabilities of vCISOs. We are versed in the growing necessity of SMBs in the supply chains of critical infrastructure to demonstrate that they have taken steps to assure their ability to prevent or recover from cyber-attacks. Note that we have included two Appendices with public source information on the DHS/CISA list of the 16 critical infrastructure sectors, as well as SMBs' participation in their supply chains. Appendix 3 sets out the features of Beta Centauri℠, our proprietary program to create an efficient working relationship between SMBs and vCISOs. In Appendix 4, we have included summaries of four articles published recently in Cyber Defense Magazine on the stages of successful relationships between SMBs and vCISOs. Typically, SMBs have experienced a fundamental conflict between the importance of managing the risk of cyber attacks and the cost of having a full time Chief Information Security Officer (CISO). To begin with, the basic techniques of cyber risk management can be overwhelming to owners and managers of SMBs; they are complex and tend to change quickly as new forms of attack and response develop. According to Bank of America's most recent Small Business Report, while 71% of small businesses report that they have digitally optimized their operations over the past 12 months, only 21% have added cybersecurity measures to their businesses. Of mid-sized businesses, 90% report that cybersecurity is a threat to their business, but only 63% are keeping software up to date, 60% are investing in digital security systems, and a paltry 50% are investing in employee security training [1]. Unfortunately, the myth persists that SMBs are too small to be targets for cyber criminals. On the contrary, they are often low-hanging fruit, with a combination of lax cybersecurity measures making them subject to existential threats by such attack modes as ransomware. According to a Microsoft report conducted by research firm Bredin, one-third of SMBs suffered a cyber attack during the past year (2024), with the average cost of each incident amounting to over $250,000.[2] The potential adverse impact of a ransomware attack or data breach can be devastating. It has been observed that it would have a similar effect on a company in the critical infrastructure supply chain as a provider of services requiring security clearances for employees. If a vital employee suffered an identity theft incident, they would be unable to access the government secure facility to carry out their work. [1] Bank of America. (2024). 2024 Business Owner Report. https: //business.bofa.com/en-us/content/2024-business-owner-report.html [2] https: //cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/SMBCybersecurity-Report-Final.pdf

9 特價1267
立即代訂
下次再買

The Future of Hacking

2025/07/04 出版

In a world, where cyber threats evolve daily, the line between hacker and hero is thinner than you think. Hacking is no longer just a shadowy underground activity-it's an essential part of our digital world. The Future of Hacking explores the evolving landscape of cybersecurity, ethical hacking, and digital defense, revealing how hackers protect as much as they attack. Drawing on extensive research and expert interviews from around the world, Laura Scherling uncovers the real-world impact of cybercrime, internet freedom, and digital policy. This accessible yet deeply researched book challenges misconceptions about hacking, highlights the work of those defending our digital future, and helps readers understand why cybersecurity is now everyone's concern. The future of hacking is here.

9 特價1866
立即代訂
下次再買

You Have a New Memory

Aiden,Arata  著
2025/07/03 出版

NATIONAL BESTSELLER An open-hearted interrogation of our digital selves, braiding cultural criticism, memoir, and narrative musings into an exploration of identity, girlhood, media, tech, nature and "finding the depth and beauty in the fucked-up world we live in" from a writer, artist, and influencer (Phoebe Bridgers). YOU HAVE A NEW MEMORY is a deeply human inventory of the digital sphere, a searing analysis of the present and a prescient assessment of the future. In her highly anticipated debut, Aiden Arata brings us raw reportage from the liminal space between online and offline worlds, illuminating how we got here and where to go next. With high-res, cosmic vision and razor-sharp wit, this kaleidoscopic collection of essays artfully explores what it means to exist on the internet. Arata exposes influencer grifts from the perspective of a grifter, digs into the alluring aesthetic numbness of stay-at-home girlfriend content creators, and interrogates our online fetishization of doom to grapple with the real-world apocalypse. Arata is the wry, unexpected voice we need to navigate existing simultaneously as creators, consumers, and products in our increasingly braver and newer world.

9 特價957
立即代訂
下次再買

Artificial Intelligence Paradigms for Application Practice

Shiguo,Lian  著
CRC Press 出版
2025/07/03 出版

This book proposes practical application paradigms for deep neural networks, aiming to establish best practices for their real-world implementation.

9 特價4801
立即代訂
下次再買

The Language of Machines

2025/07/01 出版

This book offers a clear, accessible guide to the inner workings and real-world impact of large language models (LLMs). As AI becomes increasingly integrated into daily life, understanding how LLMs generate human-like text is crucial for professionals across technology, education, policy, and more. The book covers core concepts in NLP and machine learning, while addressing ethical concerns like algorithmic bias, privacy, and automation's effects on employment. Through real-world case studies from organizations like OpenAI and DeepMind, it explores both the promise and risks of AI-powered communication tools. By connecting technological advancements with ethical and societal questions, The Language of Machines equips readers to engage thoughtfully with AI and its evolving role in shaping our world.

9 特價3167
立即代訂
下次再買

Computer Network LAB

2025/07/01 出版

Networking refers to the practice of connecting computers and other devices to share resources, exchange data, and communicate. It forms the backbone of modern communication and the internet, enabling everything from email and social media to cloud computing.Objectives of a Computer Network LabEducational: Provide hands-on experience with networking hardware and software.Research: Enable experimentation and development of new networking protocols and technologies.Testing: Allow for the simulation and analysis of network performance and security.Development: Support the creation and troubleshooting of network-based applications.

9 特價3167
立即代訂
下次再買

Energy and Throughput Optimization in NB-IoT Networks

2025/07/01 出版

This study aims to enhance energy efficiency and network throughput in Narrowband IoT (NB-IoT) and Narrowband Cognitive Radio IoT (NB-CR-IoT) networks. A novel three-hop communication strategy is proposed, employing a double auction mechanism to optimize relay selection and extend the battery life of cell-edge NB-IoT users (CENUs). The approach is supported by the EENU-MWM algorithm, which ensures efficient and fair user matching. With the rapid proliferation of IoT devices, critical challenges such as spectrum congestion and hardware limitations for continuous sensing have emerged. To address these issues, the study introduces optimized sensing parameters and relay node selection strategies within NB-CR-IoT and Narrowband Cognitive Radio Internet of Medical Things (NB-CR-IoMT) frameworks. These enhancements improve overall data throughput while reducing transmission power consumption.

9 特價5105
立即代訂
下次再買

IoT Security using VHDL

Designing robust IoT security solutions using VHDL offers a pathway to hardware-level protection against various threats. VHDL allows developers to implement cryptographic algorithms like AES or RSA directly into the hardware, providing significantly faster and more energy-efficient encryption compared to software implementations. Furthermore, VHDL can be used to create secure boot mechanisms that verify the integrity of firmware during startup, preventing unauthorized code execution. Implementing access control mechanisms and authentication protocols in hardware using VHDL also strengthens security by reducing the attack surface vulnerable to software exploits. By leveraging the capabilities of VHDL, developers can create tamper-resistant and highly secure IoT devices that are difficult for malicious actors to compromise, ultimately fostering trust and reliability within connected ecosystems.

9 特價3672
立即代訂
下次再買

Wireless Sensor Network Security

2025/07/01 出版

Wireless Sensor Networks (WSNs) have expanded rapidly due to advances in communication technologies, offering diverse applications that benefit society. WSNs rely on interconnected sensor nodes and demand secure data transmission and resource access to ensure Quality of Service (QoS) in IoT systems. However, current systems often rely on single-layer security or classical cryptography, which are prone to attacks and lead to energy inefficiency from key management tasks. Biometric or fuzzy logic-based methods also fall short in optimizing security. A lightweight, secure, and durable paradigm for WSNs is crucial. We propose a high-efficiency routing system using Systematic-Random Linear Network Coding (S-RLNC), integrating multi-generation mixing, advanced pre-coding, and interleaving for secure, QoS- aware communication. Simulations show improved packet delivery, reduced redundancy, energy efficiency, and minimal packet loss. Additionally, a novel multi-factor authentication approach combining biometrics, time stamping, and RSA-assisted ECC enhances security and QoS with lower latency and higher delivery rates.

9 特價3167
立即代訂
下次再買

Self-Healing Networks and Resilient Architectures

Nutan,Gusain  著
2025/07/01 出版

This book explores the emerging paradigm of self-healing networks-digital infrastructures that can automatically detect, diagnose, and repair faults without human intervention. With growing reliance on uninterrupted connectivity across sectors like healthcare, smart cities, military, and autonomous systems, network resilience has become critical. The book explains key concepts such as fault tolerance, robustness, survivability, and adaptability, and shows how these are achieved through technologies like AI/ML, SDN, NFV, edge computing, blockchain, and digital twins. It outlines practical design principles for building networks that remain operational even in failure conditions, offering both theoretical foundations and real-world case studies. Written in an engaging, accessible style, the book serves as a guide for engineers, researchers, and decision-makers aiming to build intelligent, fault-tolerant, and highly available network systems.

9 特價3258
立即代訂
下次再買

Navigating the Digital Maze

2025/06/30 出版

Navigating the Digital Maze-Social Media, Mental Health, and Safety is a guide to the connections between social media, mental health, and safety. It goes on to explore the impact social media has had on mental health since the rise of YouTube, Instagram, TikTok, and Snapchat, providing tips for healthy social media consumption with a focus on authenticity, equanimity, and moderation. The book addresses some of today's most pressing topics-cyberbullying, trolling, body-shaming-and provides proven prevention and coping strategies for teens. It also highlights the contribution parents, educators, and therapists must make for the maintenance of a safe digital world, along with chapters on self-care methods such as journaling and mindfulness. Navigating the Digital Maze gives readers the knowledge needed to navigate their online presence and form helpful online communities to lead a more healthy, balanced digital life.

9 特價2065
立即代訂
下次再買

Computational Science and Its Applications - Iccsa 2025

Springer 出版
2025/06/30 出版

The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th International Conference on Computational Science and Its Applications - ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 71 full papers, 6 short papers, and 1 PHD showcase paper were carefully reviewed and selected from 269 submissions. The papers have been organized in topical sections as follows: Part I: Computational Methods, Algorithms and Scientific Applications; High Performance Computing and Networks; Geometric Modeling, Graphics and Visualization; Advanced and Emerging Applications; Information Systems and Technologies; Urban and Regional Planning. Part II: Information Systems and Technologies; Part III: Information Systems and Technologies; Urban and Regional Planning; PHD Showcase Paper; Short papers.

9 特價4697
立即代訂
下次再買

Navigating the Digital Maze

2025/06/30 出版

Navigating the Digital Maze-Social Media, Mental Health, and Safety is a guide to the connections between social media, mental health, and safety. It goes on to explore the impact social media has had on mental health since the rise of YouTube, Instagram, TikTok, and Snapchat, providing tips for healthy social media consumption with a focus on authenticity, equanimity, and moderation. The book addresses some of today's most pressing topics-cyberbullying, trolling, body-shaming-and provides proven prevention and coping strategies for teens. It also highlights the contribution parents, educators, and therapists must make for the maintenance of a safe digital world, along with chapters on self-care methods such as journaling and mindfulness. Navigating the Digital Maze gives readers the knowledge needed to navigate their online presence and form helpful online communities to lead a more healthy, balanced digital life.

9 特價1606
立即代訂
下次再買

Learning Kubernetes Security - Second Edition

Raul,Lapaz  著
Packt 出版
2025/06/30 出版

Get practical, hands-on experience in Kubernetes security-from mastering the fundamentals to implementing advanced techniques to safeguard your Kubernetes deployments against malicious threatsKey Features: - Understand Kubernetes security fundamentals through real-world examples of threat actor tactics- Navigate the complexities of securing container orchestration with practical, expert insights- Deploy multiple Kubernetes components, plugins, and third-party tools to proactively defend against cyberattacks- Purchase of the print or Kindle book includes a free PDF eBookBook Description: With readily available services, support, and tools, Kubernetes has become a foundation for digital transformation and cloud-native development, but it brings significant security challenges such as breaches and supply chain attacks.This updated edition equips you with defense strategies to protect your applications and infrastructure while understanding the attacker mindset, including tactics like container escapes and exploiting vulnerabilities to compromise clusters. The author distills his 25+ years of experience to guide you through Kubernetes components, architecture, and networking, addressing authentication, authorization, image scanning, resource monitoring, and traffic sniffing. You'll implement security controls using third-party plugins (krew) and tools like Falco, Tetragon, and Cilium. You'll also secure core components, such as the kube-apiserver, CoreDNS, and kubelet, while hardening images, managing security contexts, and applying PodSecurityPolicy. Through practical examples, the book teaches advanced techniques like redirecting traffic from misconfigured clusters to rogue pods and enhances your support incident response with effective cluster monitoring and log analysis.By the end of the book, you'll have a solid grasp of container security as well as the skills to defend your clusters against evolving threats.What You Will Learn: - Implement Kubernetes security best practices, from threat detection to network protection- Build strong security layers and controls using core Kubernetes components- Apply theory through hands-on labs to secure Kubernetes systems step by step- Use security plugins and open-source tools to help mitigate container-based threats- Set up monitoring and logging to quickly detect and respond to cybersecurity threats- Analyze attacker tactics to build stronger cluster defense strategiesWho this book is for: This book is for DevOps and Platform teams managing Kubernetes environments. As security is a shared responsibility, it also addresses on-premises and cloud security professionals, as well as beginner and advanced incident responders. No expert knowledge is required; a basic tech background is all you need as this book covers Kubernetes fundamentals and security principles, delivering practical insights for anyone looking to stay current with modern tech and strengthen their security skills.Table of Contents- Kubernetes Architecture- Kubernetes Networking- Threat Modeling- Applying the Principle of Least Privilege in Kubernetes- Configuring Kubernetes Security Boundaries- Securing Cluster Components- Authentication, Authorization, and Admission Control- Securing Pods- Shift Left (Scanning, SBOM, and CI/CD)- Real-Time Monitoring and Observability- Security Monitoring and Log Analysis- Defense in Depth- Kubernetes Vulnerabilities and Container Escapes- Third-Party Plugins for Securing Kubernetes

9 特價2064
立即代訂
下次再買

Computational Science and Its Applications - Iccsa 2025

Springer 出版
2025/06/29 出版

The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th International Conference on Computational Science and Its Applications - ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 71 full papers, 6 short papers, and 1 PHD showcase paper were carefully reviewed and selected from 269 submissions. The papers have been organized in topical sections as follows: Part I: Computational Methods, Algorithms and Scientific Applications; High Performance Computing and Networks; Geometric Modeling, Graphics and Visualization; Advanced and Emerging Applications; Information Systems and Technologies; Urban and Regional Planning. Part II: Information Systems and Technologies; Part III: Information Systems and Technologies; Urban and Regional Planning; PHD Showcase Paper; Short papers.

9 特價4175
立即代訂
下次再買

Computational Science and Its Applications - Iccsa 2025

Springer 出版
2025/06/29 出版

The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th International Conference on Computational Science and Its Applications - ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 71 full papers, 6 short papers, and 1 PHD showcase paper were carefully reviewed and selected from 269 submissions. The papers have been organized in topical sections as follows: Part I: Computational Methods, Algorithms and Scientific Applications; High Performance Computing and Networks; Geometric Modeling, Graphics and Visualization; Advanced and Emerging Applications; Information Systems and Technologies; Urban and Regional Planning. Part II: Information Systems and Technologies; Part III: Information Systems and Technologies; Urban and Regional Planning; PHD Showcase Paper; Short papers.

9 特價4175
立即代訂
下次再買

Computers and Their Applications

Ajay,Bandi  著
Springer 出版
2025/06/27 出版

This book constitutes the proceedings of the 40th International Conference on Computers and Their Applications, CATA 2025, which took place in San Francisco, CA, USA, during March 17-18, 2025. The 19 papers included in this book were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: Algorithms and AI;M machine learning and data mining; and security and networking.

9 特價4436
立即代訂
下次再買

Social First Brands

Tom,Miner  著
Kogan Page 出版
2025/06/27 出版

How can you build a social media strategy that outlasts trends and delivers real impact? Social First Brands is a practical guide for mid-career marketing professionals who want to develop strategies that create authentic connections, strengthen brand credibility and drive measurable results. Written by social media expert Tom Miner, it shares proven frameworks, examples and actionable tools from brands like Crocs, Stanley, Funko, and Ryanair. By showing how leading companies put social media at the heart of their marketing, this book equips you to move beyond quick wins and hacks to build strategies grounded in human behavior and long-term value. You will learn how to: - Develop a bespoke social media strategy aligned with brand principles- Build communities that foster loyalty and advocacy- Define and apply a distinctive, consistent brand personality online- Optimize content to resonate across audiences and platforms With detailed chapters, real-world examples and clear implementation steps, Social First Brands helps you apply proven principles to elevate your brand presence, strengthen customer relationships and advance your career impact. Themes include: strategy, principles, social media optimization, brand personality, audience engagement, community building

9 特價6633
立即代訂
下次再買

Innovative Computing 2025, Volume 3

Hao-Shang,Ma  著
Springer 出版
2025/06/27 出版
9 特價9395
立即代訂
下次再買

Prompting Made Simple

Rajeev,Kapur  著
Rinity Media 出版
2025/06/27 出版

UNLOCK THE POWER OF WORDS IN THE AGE OF AIYou don't need to code, you just need to know how to ask the right questions.Prompting Made Simple is your essential guide to mastering the most valuable new skill of the 21st century: communicating with AI.Whether you're a CEO, entrepreneur, teacher, or just curious about AI, this book gives you the keys to unlock superhuman productivity, creativity, and decision-making, using the right words at the right time.Inside, you'll discover: Proven prompt frameworks to get exactly what you want from ChatGPT and other AIsReal-world examples for business, education, writing, coding, and moreTime-saving shortcuts and expert techniques for beginners and pros alikePitfalls to avoid, and how to future-proof your skills in the AI eraThink of ChatGPT like a genie. Your wish is its command, if you know how to ask.Written by bestselling author of AI Made Simple, and AI advisor Rajeev Kapur, Prompting Made Simple doesn't just teach you how to talk to AI, it teaches you how to think in the age of AI.Prompting Made Simple makes AI easy, useful, and fun. You'll learn how to: Write better emails, plan smarter vacations, and organize your lifeGet AI to brainstorm, tutor, troubleshoot, and write with youUse real-world prompts that work right out of the boxIt's like having a tech-savvy best friend on call 24/7 that is fast, practical, and sometimes laugh-out-loud surprising.If AI Made Simple opened the door, Prompting Made Simple hands you the keys.

9 特價579
立即代訂
下次再買

Social First Brands

Tom,Miner  著
Kogan Page 出版
2025/06/27 出版

How can you build a social media strategy that outlasts trends and delivers real impact? Social First Brands is a practical guide for mid-career marketing professionals who want to develop strategies that create authentic connections, strengthen brand credibility and drive measurable results. Written by social media expert Tom Miner, it shares proven frameworks, examples and actionable tools from brands like Crocs, Stanley, Funko, and Ryanair. By showing how leading companies put social media at the heart of their marketing, this book equips you to move beyond quick wins and hacks to build strategies grounded in human behavior and long-term value. You will learn how to: - Develop a bespoke social media strategy aligned with brand principles- Build communities that foster loyalty and advocacy- Define and apply a distinctive, consistent brand personality online- Optimize content to resonate across audiences and platforms With detailed chapters, real-world examples and clear implementation steps, Social First Brands helps you apply proven principles to elevate your brand presence, strengthen customer relationships and advance your career impact. Themes include: strategy, principles, social media optimization, brand personality, audience engagement, community building

9 特價1929
立即代訂
下次再買

6gn for Future Wireless Networks

Xiuhua,Li  著
Springer 出版
2025/06/26 出版

This volume set constitutes the proceedings of the 7th EAI International Conference on 6GN for Future Wireless Networks, 6GN 2024, held in Chongqing, China, in October 19-20, 2024. The 18 papers included in these proceedings were carefully reviewed and selected from50 submissions.They focus on the following topical sections such as Wireless Control and Network Optimization; Edge Computing and Resource Allocation; Intelligent Systems and Simulation; Artificial Intelligence and Digital Economy.

9 特價10439
立即代訂
下次再買

Introduction to Modern Cryptography

CRC Press 出版
2025/06/26 出版

Introduction to Modern Cryptography is the most relied-upon source in the field. The book provides a mathematically rigorous yet accessible treatment of this fascinating subject. This is an updated edition of the most widely used introduction to cryptography textbook.

9 特價8352
立即代訂
下次再買

High-Speed Large Capacity Optical Fiber Communications

Feng,Tian  著
Springer 出版
2025/06/25 出版

This book systematically explores the synergistic integration of multidimensional modulation and coding technology, extend wavelength division multiplexing, space division multiplexing (SDM) and signal processing techniques to unlock unprecedented transmission capacities. From foundational principles to experimental validations, this book bridges theoretical concepts with practical implementations, offering a holistic view of scalable solutions for next-generation optical networks. Delving into both established and emerging paradigms, this book develops the key technology of improving the capacity of the transmission. It covers hybrid concatenated coding schemes, multi-carrier generation or multi-band transmission in achieving terabit-scale throughputs. This book also examines the role of self-homodyne coherent systems, SDM transmission system and the channel damage compensation algorithms, illustrates the real-world applicability of these technologies. The concluding chapter synthesizes key advancements and anticipates future challenges, positioning this book as an indispensable resource for researchers, engineers and graduate students seeking to advance the frontiers of high-speed, high-capacity optical communications.

9 特價10439
立即代訂
下次再買

The CISO 3.0

Walt,Powell  著
CRC Press 出版
2025/06/25 出版

The CISO 3.0 isn't just a book; it's a roadmap for the next generation of cybersecurity leadership. In an era where cyber threats are more sophisticated and the stakes are higher than ever, CISOs can no longer rely solely on technical expertise.

9 特價8874
立即代訂
下次再買

Data and Applications Security and Privacy XXXIX

Springer 出版
2025/06/25 出版

This book constitutes the refereed proceedings of the 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy XXXIX, DBSec 2025, held in Gj繪vik, Norway, during June 23-24, 2025. The 19 full papers and 5 short papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: AI applications in security and privacy; User and data privacy; Database and storage security; Differential privacy; Attackers and attack detection; Access control & Internal Controls and Audit process; and Cryptography for security and privacy.

9 特價3914
立即代訂
下次再買

How to Use ChatGPT for Authors

2025/06/25 出版
9 特價871
立即代訂
下次再買

Stripes Online Organizer

Gooseberry 出版
2025/06/24 出版

No more slips of paper with passwords jotted down! Gooseberry Patch watercolor artwork makes organizing your websites fun... a real time-saver too. Keep track of your usernames/logins and, every changing, passwords you create in our password keeper. - 82 pages alphabetical pages- Room to list Web site address, usernames, passwords, and your important notes- Spiral binding allows pages to lie flat for ease of use- 7" high, 4" wide makes it easy to hide in a desk drawer, purse or briefcase "I love this passcode book and have bought several for friends and relatives to keep next to their computers." Mary L T, Amazon Reviewer I bought this as a "replacement for an exact book that I had over twenty years. Good quality." Anne R, Amazon Reviewer "This book is perfect for organization in your home office." Jeffrey J G, Amazon Reviewer

9 特價306
貨到通知
下次再買

Securing the Digital Frontier

2025/06/24 出版

Cyber space is easily the most complex thing humans have ever created. With billions of people and devices all connected together, vulnerability and compromise are inevitable. The complexity continues to grow, and with it comes the emergent insecurity brought by an ever-developing frontier where digital devices and connected people meet. Security challenges present themselves increasingly often and with ever-greater impacts. This is not going to change anytime soon. Although the internet has transformed communication, business, and social life for the better, the construct of 'cyber space' is incredibly fragile and presents endless risk. Connecting every corner of our lives to those of billions across the world, the frontier is slender between the good and the bad, benefit and catastrophe, real and fake, security and insecurity. Cyber security advice can be confusing, contradictory, and sometimes utterly detached from reality. Too easily, people feel guilty for not knowing what to do, or failing to live up to expectations. People, particularly business leaders and policy makers, must daily make security-sensitive decisions, sometimes unknowingly, without being security experts. Securing the Digital Frontier doesn't offer easy answers, but instead explains sixteen dimensions of this dynamic problem and its current partial solutions. The strong technology of encryption has become commonplace, and is a huge benefit if deployed well: but how can you tell? Programming errors give rise to security problems, but why can we not eliminate them? Privacy is tied up with security, but can the two work against each other? Cyber space is international: how can domestic laws protect us? And what happens when those laws come into conflict with technologies like encryption? Why do you need a punctuation symbol and a capital letter in your password, anyway? Through a grasp of the big picture, through technical and human perspectives, we can begin to explore ways to unwind some of the complexity and find ways to contain the risk.

9 特價1921
立即代訂
下次再買

The Ciso 3.0

Walt,Powell  著
CRC Press 出版
2025/06/24 出版

The CISO 3.0 isn't just a book; it's a roadmap for the next generation of cybersecurity leadership. In an era where cyber threats are more sophisticated and the stakes are higher than ever, CISOs can no longer rely solely on technical expertise.

9 特價3600
立即代訂
下次再買

The Design of Web Apis, Second Edition

2025/06/24 出版
9 特價2753
立即代訂
下次再買

Applied Cryptography and Network Security

Springer 出版
2025/06/23 出版

This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.

9 特價7307
立即代訂
下次再買

Practical Deep Learning, 2nd Edition

No Starch Press 出版
2025/06/22 出版

Deep learning made simple. Dip into deep learning without drowning in theory with this fully updated edition of Practical Deep Learning from experienced author and AI expert Ronald T. Kneusel. After a brief review of basic math and coding principles, you'll dive into hands-on experiments and learn to build working models for everything from image analysis to creative writing, and gain a thorough understanding of how each technique works under the hood. Whether you're a developer looking to add AI to your toolkit or a student seeking practical machine learning skills, this book will teach you: How neural networks work and how they're trainedHow to use classical machine learning modelsHow to develop a deep learning model from scratchHow to evaluate models with industry-standard metricsHow to create your own generative AI modelsEach chapter emphasizes practical skill development and experimentation, building to a case study that incorporates everything you've learned to classify audio recordings. Examples of working code you can easily run and modify are provided, and all code is freely available on GitHub. With Practical Deep Learning, second edition, you'll gain the skills and confidence you need to build real AI systems that solve real problems. New to this edition: Material on computer vision, fine-tuning and transfer learning, localization, self-supervised learning, generative AI for novel image creation, and large language models for in-context learning, semantic search, and retrieval-augmented generation (RAG).

9 特價2394
立即代訂
下次再買

Applied Cryptography and Network Security

Springer 出版
2025/06/21 出版

This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.

9 特價7307
立即代訂
下次再買

Applied Cryptography and Network Security

Springer 出版
2025/06/21 出版

This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.

9 特價7307
立即代訂
下次再買
頁數10/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing